The Massachusetts Supreme Judicial Court (MSJC) has ordered a lawyer to decrypt his laptop computers. The lawyer, one Leon Gelfgatt, is a criminal suspect in an ongoing case involving Russians and mortgage fraud, and as far as I can tell (as a non-lawyer), his biggest mistake was in not following the aged maxim: “don’t speak […] read more
According to the US Supreme Court, US authorities require warrants in order to search the cellphones of people who are arrested [http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf ; ]. The decision is not solely for cellphones, though: rummaging through information found on smartphones, tablet computers, laptops, etc. should also be affected, with personal privacy being the winner. Also, I imagine […] read more
While I don’t mean to pick on Colorado Neurodiagnostics, a Colorado company that recently experienced a patient data breach, the short article announcing the loss of their computer with medical data illustrates how one can conclude that HIPAA laptop encryption was not used. Colorado Neurodiagnostics PHI Breach According to denverpost.com, a Colorado Neurodiagnostics laptop containing […] read more
The BYOD culture is saving companies about $1,300 per mobile user. Employees who bring their own devices also tend to be happier and more productive. How could a BYOD policy possibly have any downside? Unfortunately, BYOD also brings new security concerns. Recent data breaches have brought the need for data security to the news on a […] read more
UK Data Breaches: ICO Reviewing Impact Of Monetary Penalties, Threatens "Contempt Of Court" Charges.
The UK’s Information Commissioner’s Office (ICO) is investigating the effects of monetary penalties on organizations that breach the Data Protection Act (DPA). With the ability to fine up to £500,000, the monetary penalty is a formidable way DPA enforcement tool: not only does the fear of a large fine prompt action, it spreads the news […] read more
The US Department of Health and Human Services, Office for Civil Rights has released their annual report on data breaches involving protected health information. The report covers the dates of January 1, 2011 through December 31, 2012, according to phiprivacy.net. While it may reflect the near past, it shows why HIPAA encryption is so important: […] read more
Leaving your 9-to-5 job for an entrepreneurial opportunity can seem a bit like jumping off a cliff without a parachute — the risk seems greater than any potential benefit. Striking out on your own can translate to a drained savings account and fewer vacations as you reinvest your profits in your company. And while it’s also […] read more
Desktop Encryption: LA County Encrypts All Workstations, Will Require The Same From Contracted Agencies.
It escaped my notice, so I’m opining on this three weeks late – to be honest, a quick search seems to indicate that almost no one covered this particular development – but Los Angeles County has moved to up their data security by pursuing workstation encryption, as seen in this motion. All I can say […] read more
How can you effectively secure your data? Recent breaches have highlighted the need to step up security measures, but what options do you have? Many people use the terms cryptography and encryption interchangeably. Unfortunately, cryptography, while fun in social situations to create “secret” messages, is not going to protect your data. And even encryption that uses […] read more
It’s hard to believe that in this day and age people still associate “password-protection” with actual, real data protection. At least, that’s what’s implied by the people who’ve released breach notifications for Alaska’s Mallott gubernatorial campaign and Sharper Future, a “private sector mental health provider.” Who, exactly, did these organizations consult with to make these […] read more